GHSA-mg7h-9qfx-4r83

Suggest an improvement
Source
https://github.com/advisories/GHSA-mg7h-9qfx-4r83
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-mg7h-9qfx-4r83/GHSA-mg7h-9qfx-4r83.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mg7h-9qfx-4r83
Published
2024-06-07T20:46:14Z
Modified
2024-12-04T05:25:14.395411Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
ZendFramework Potential Proxy Injection Vulnerabilities
Details

Zend\Session\Validator\RemoteAddr and Zend\View\Helper\ServerUrl were found to be improperly parsing HTTP headers for proxy information, which could potentially allow an attacker to spoof a proxied IP or host name.

In Zend\Session\Validator\RemoteAddr, if the client is behind a proxy server, the detection of the proxy URL was incorrect, and could lead to invalid results on subsequent lookups.

In Zend\View\Helper\ServerUrl, if the server lives behind a proxy, the helper would always generate a URL based on the proxy host, regardless of whether or not this was desired; additionally, it did not take into account the proxy port or protocol, if provided.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-74"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-06-07T20:46:14Z"
}
References

Affected packages

Packagist / zendframework/zendframework

Package

Name
zendframework/zendframework
Purl
pkg:composer/zendframework/zendframework

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.0.0
Fixed
2.0.5

Affected versions

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.0.4